User's Manual
Table Of Contents
- Foreword
- Important Safeguards and Warnings
- 1 Overview
- 2 Configuration Flow
- 3 Device Initialization
- 4 Login
- 5 Main Interface
- 6 Setting
- 6.1 Local
- 6.2 Camera
- 6.2.1 Setting Image Parameters
- 6.2.2 Setting Encode Parameters
- 6.2.2.1 Encode
- 6.2.2.2 Overlay
- 6.2.2.2.1 Configuring Privacy Masking
- 6.2.2.2.2 Configuring Channel Title
- 6.2.2.2.3 Configuring Time Title
- 6.2.2.2.4 Configuring Location
- 6.2.2.2.5 Configuring Font Properties
- 6.2.2.2.6 Configuring Picture Overlay
- 6.2.2.2.7 Configuring Custom Title
- 6.2.2.2.8 Configuring Target Statistics
- 6.2.2.2.9 Configuring Face Detection
- 6.2.2.2.10 Configuring Face Recognition
- 6.2.2.2.11 Configuring Face Statistics
- 6.2.2.3 ROI
- 6.2.3 Setting Audio Parameters
- 6.3 Network
- 6.4 Event
- 6.5 Storage
- 6.6 System
- 6.7 System Information
- 6.8 Setting Log
- 7 Live
- 8 AI
- 9 Camera
- 10 Event
- 11 System
- 12 Security
- 13 Record
- 14 Picture
- 15 Report
- Appendix 1 Cybersecurity Recommendations
Operation Manual
VIII
12.4.2 Installing Trusted CA Certificate
................................................................................... 123
12.5 A/V Encryption
........................................................................................................................ 124
12.6 Security Warning
..................................................................................................................... 125
13 Record
.............................................................................................................................................. 126
13.1 Playback
................................................................................................................................... 126
13.1.1 Playing Back Video
......................................................................................................... 126
13.1.2 Clipping Video
................................................................................................................. 128
13.1.3 Downloading Video
........................................................................................................ 129
13.2 Setting Record Control
........................................................................................................... 130
13.3 Setting Record Plan
................................................................................................................ 131
13.4 Storage
..................................................................................................................................... 132
13.4.1 Local Storage
.................................................................................................................. 133
13.4.2 Network Storage
............................................................................................................. 134
13.4.2.1 FTP
........................................................................................................................... 134
13.4.2.2 NAS
.......................................................................................................................... 135
14 Picture
.............................................................................................................................................. 137
14.1 Playback
................................................................................................................................... 137
14.1.1 Playing Back Picture
...................................................................................................... 137
14.1.2 Downloading Picture
...................................................................................................... 138
14.2 Setting Snapshot Parameters
................................................................................................ 139
14.3 Setting Snapshot Plan
............................................................................................................ 140
14.4 Storage
..................................................................................................................................... 140
15 Report
............................................................................................................................................... 141
Appendix 1 Cybersecurity Recommendations
................................................................................. 142